Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2005. A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. Concurrency and Computation: Practice and Experience. 17(11):1441-1467.
1995. A simple randomized sieve algorithm for the closest-pair problem. Information and Computation. 118(1):34-37.
2009. Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
2009. Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
2012. Sharpness Estimation for Document and Scene Images. International Conference on Pattern Recognition (ICPR 2012). :3292-3295.
2011. Shape Codebook based Handwritten and Machine Printed Text Zone Extraction. Document Recognition and Retrieval. :7874:1-8-7874:1-8.
2009. Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
2011. Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. Proceedings of the 2011 international conference on Management of data. :841-852.
1998. A semidiscrete matrix decomposition for latent semantic indexing information retrieval. ACM Trans. Inf. Syst.. 16(4):322-346.
2004. A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
2013. Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
2011. Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
2011. Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
2015. Segmentation and sub-cellular feature-based analysis of microscopy images. BioImage Informatics Conference .
2003. Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2010. Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
2004. Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
2005. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
2002. A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.